First published: Tue Apr 16 2019(Updated: )
CVE-2019-10911: Add a separator in the remember me cookie hash
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/symfony/symfony | >=2.7.0<2.7.51>=2.8.0<2.8.50>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.26>=4.0.0<4.1.0>=4.1.0<4.1.12>=4.2.0<4.2.7 | |
composer/symfony/security | >=2.7.0<2.7.51>=2.8.0<2.8.50>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.26>=4.0.0<4.1.0>=4.1.0<4.1.12>=4.2.0<4.2.7 | |
composer/symfony/security-http | >=2.7.0<2.7.51>=2.8.0<2.8.50>=3.0.0<3.1.0>=3.1.0<3.2.0>=3.2.0<3.3.0>=3.3.0<3.4.0>=3.4.0<3.4.26>=4.0.0<4.1.0>=4.1.0<4.1.12>=4.2.0<4.2.7 | |
SensioLabs Symfony | >=2.7.0<2.7.51 | |
SensioLabs Symfony | >=2.8.0<2.8.50 | |
SensioLabs Symfony | >=3.4.0<3.4.26 | |
SensioLabs Symfony | >=4.1.0<4.1.12 | |
SensioLabs Symfony | >=4.2.0<4.2.7 | |
Drupal Drupal | >=8.5.0<8.5.15 | |
Drupal Drupal | >=8.6.0<8.6.15 | |
debian/symfony | 3.4.22+dfsg-2+deb10u1 3.4.22+dfsg-2+deb10u2 4.4.19+dfsg-2+deb11u3 5.4.23+dfsg-1 5.4.29+dfsg-1 5.4.30+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10911 is a vulnerability in Symfony that allows an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled.
Symfony versions 2.7.0 up to 2.7.51, 2.8.0 up to 2.8.50, 3.0.0 up to 3.4.26, 4.0.0 up to 4.1.12, and 4.2.0 up to 4.2.7 are affected by CVE-2019-10911.
An attacker can exploit CVE-2019-10911 by manipulating the remember me cookie hash to authenticate as a privileged user.
Yes, the recommended fix for CVE-2019-10911 is to upgrade Symfony to version 3.4.26, 4.1.12, or 4.2.7.
You can find more information about CVE-2019-10911 on the Symfony website at [insert link].